A secure ECC-based RFID mutual authentication protocol for internet of things AA Alamr, F Kausar, J Kim, C Seo The Journal of supercomputing 74, 4281-4294, 2018 | 98 | 2018 |
Digital watermarking for images security using discrete slantlet transform M Mundher, D Muhamad, A Rehman, T Saba, F Kausar Applied Mathematics & Information Sciences 8 (6), 2823, 2014 | 90 | 2014 |
An efficient key distribution scheme for heterogeneous sensor networks S Hussain, F Kausar, A Masood Proceedings of the 2007 international conference on Wireless communications …, 2007 | 78 | 2007 |
Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol Z Bilal, A Masood, F Kausar 2009 international conference on network-based information systems, 260-267, 2009 | 75 | 2009 |
Secure group communication with self-healing and rekeying in wireless sensor networks F Kausar, S Hussain, JH Park, A Masood Mobile Ad-Hoc and Sensor Networks: Third International Conference, MSN 2007 …, 2007 | 67 | 2007 |
Scalable and efficient key management for heterogeneous sensor networks F Kausar, S Hussain, LT Yang, A Masood The Journal of Supercomputing 45, 44-65, 2008 | 66 | 2008 |
Snapchat analysis to discover digital forensic artifacts on android smartphone T Alyahya, F Kausar Procedia Computer Science 109, 1035-1040, 2017 | 50 | 2017 |
Intelligent home monitoring using RSSI in wireless sensor networks F Kausar, E Al Eisa, I Bakhsh International Journal of Computer Networks & Communications 4 (6), 33, 2012 | 45 | 2012 |
A cluster-based key agreement scheme using keyed hashing for body area networks A Ali, S Irum, F Kausar, FA Khan Multimedia tools and applications 66, 201-214, 2013 | 41 | 2013 |
Hybrid client side phishing websites detection approach F Kausar, B Al-Otaibi, A Al-Qadi Advanced Engineering Technology and Application 4 (3), 1-9, 2015 | 34 | 2015 |
Iris based cancelable biometric cryptosystem for secure healthcare smart card F Kausar Egyptian Informatics Journal 22 (4), 447-453, 2021 | 31 | 2021 |
DHCP attacking tools: an analysis M Aldaoud, D Al-Abri, A Al Maashri, F Kausar Journal of Computer Virology and Hacking Techniques 17, 119-129, 2021 | 25 | 2021 |
Analysis of Internet Download Manager for collection of digital forensic artefacts M Yasin, AR Cheema, F Kausar Digital Investigation 7 (1-2), 90-94, 2010 | 24 | 2010 |
6G technology and taxonomy of attacks on blockchain technology F Kausar, FM Senan, HM Asif, K Raahemifar Alexandria Engineering Journal 61 (6), 4295-4306, 2022 | 20 | 2022 |
Traffic analysis attack for identifying users’ online activities F Kausar, S Aljumah, S Alzaydi, R Alroba IT Professional 21 (2), 50-57, 2019 | 18 | 2019 |
Security attacks and countermeasures on cloud assisted IoT applications A Alsaidi, F Kausar 2018 IEEE International Conference on Smart Cloud (SmartCloud), 213-217, 2018 | 18 | 2018 |
Leveraging ICN and SDN for future internet architecture: a survey M Aldaoud, D Al-Abri, M Awadalla, F Kausar Electronics 12 (7), 1723, 2023 | 16 | 2023 |
Key management and secure routing in heterogeneous sensor networks F Kausar, MQ Saeed, A Masood 2008 IEEE International Conference on Wireless and Mobile Computing …, 2008 | 16 | 2008 |
Towards a gateway-based context-aware and self-adaptive security management model for IoT-based eHealth systems W Aman, F Kausar International Journal of Advanced Computer Science and Applications 10 (1 …, 2019 | 15 | 2019 |
Analysis of download accelerator plus (dap) for forensic artefacts M Yasin, MA Wahla, F Kausar 2009 Fifth International Conference on IT Security Incident Management and …, 2009 | 14 | 2009 |